The SCEAS System
Navigation Menu

Conferences in DBLP

(bliss)
2007 (conf/bliss/2007)


  1. Evolving the Face of a Criminal: How to Search a Face Space More Effectively. [Citation Graph (, )][DBLP]


  2. Accelerating Decision Making Support in Biometric Assistant for Remote Temperature Measures. [Citation Graph (, )][DBLP]


  3. Maximum-Likelihood Watermarking Detection on Fingerprint Images. [Citation Graph (, )][DBLP]


  4. Sinusoidal Shape of a Papillary Line Crosscut. [Citation Graph (, )][DBLP]


  5. Block Model Application for Decision Support Systems. [Citation Graph (, )][DBLP]


  6. Flexible Key Distribution for SCADA Network using Multi-Agent System. [Citation Graph (, )][DBLP]


  7. Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption. [Citation Graph (, )][DBLP]


  8. Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution. [Citation Graph (, )][DBLP]


  9. Frameworks of Indexing Mechanism for Mobile Devices. [Citation Graph (, )][DBLP]


  10. An Approach to Optimize Local Trust Algorithm in SureMsg Service. [Citation Graph (, )][DBLP]


  11. A Practical Proxy Device for Protecting RFID Tag's Identifier. [Citation Graph (, )][DBLP]


  12. SecureGo: A Hardware-Software Co-Protection against Identity Theft in Online Transaction. [Citation Graph (, )][DBLP]


  13. An Intelligent Decision-Making System for Flood Monitoring from Space. [Citation Graph (, )][DBLP]


  14. Multi-Objective Evolutionary Optimizations of a Space-Based Reconfigurable Sensor Network under Hard Constraints. [Citation Graph (, )][DBLP]


  15. An Improved Particle Swarm Optimization Algorithm for Power-Efficient Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  16. An adaptive processing node architecture for validating sensors reliability in a wind farm. [Citation Graph (, )][DBLP]


  17. Making Hardware Soft in Intelligent Systems. [Citation Graph (, )][DBLP]


  18. Modelling of Anticipatory Behaviour for Self-Control and Adaptability with Applications to Autonomous Systems. [Citation Graph (, )][DBLP]


  19. Image Analysis by Means of the Stochastic Matrix Method of Function Recovery. [Citation Graph (, )][DBLP]


  20. Processing Bank Checks with Genetic Programming and Histograms. [Citation Graph (, )][DBLP]


  21. An Improved LDA Approach with DFB Preprocessing for Face Recognition. [Citation Graph (, )][DBLP]


  22. A Multi-Classifier Approach to Modelling Human and Automatic Visual Cognition. [Citation Graph (, )][DBLP]


  23. MAVIS: A Secure Formal Computational Paradigm based on the Mammalian Visual System. [Citation Graph (, )][DBLP]


  24. A Threshold Free Clustering Algorithm for Robust Unsupervised Classification. [Citation Graph (, )][DBLP]


  25. Spread Transform Watermarking for Digital Multimedia Using the Complex Wavelet Domain. [Citation Graph (, )][DBLP]


  26. Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification. [Citation Graph (, )][DBLP]


  27. I2S3 the Integrated Intelligent Secure Sensor Systems Project. [Citation Graph (, )][DBLP]


  28. On Some Directions in Security-Oriented Research. [Citation Graph (, )][DBLP]


  29. Artificial Immune Systems -- an Emergent Technology Performing the Defence of Complex Systems. [Citation Graph (, )][DBLP]


  30. Using Genetic Algorithms in Chem-Bio Defense Applications. [Citation Graph (, )][DBLP]


  31. Prediction of Protein Conformation with Potential Applications to Medical Diagnosis and Defence. [Citation Graph (, )][DBLP]


  32. Data Mining Usage in Emboli Detection. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002